메뉴 건너뛰기




Volumn 10, Issue 1, 2010, Pages 39-50

An autonomous framework for early detection of spoofed flooding attacks

Author keywords

DDoS; DoS; Flooding; Information entropy; Theory of evidence; Traffic profiling

Indexed keywords

DDOS; DENIAL OF SERVICE; DYNAMIC NETWORK; FLOODING ATTACKS; INFORMATION ENTROPY; SOURCE-END DEFENSE; THEORY OF EVIDENCE; TRAFFIC PROFILING;

EID: 80054075678     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (23)
  • 1
    • 0038059205 scopus 로고    scopus 로고
    • IP traceback with deterministic packet marking
    • Apr
    • A. Belenky, and N. Ansari, "IP traceback with deterministic packet marking," IEEE Communications Letter, vol. 7, pp. 162-164, Apr. 2003
    • (2003) IEEE Communications Letter , vol.7 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 2
    • 4143130116 scopus 로고    scopus 로고
    • CERT Coordination Center
    • CERT Coordination Center, Denial of Service Attacks. (http://www.cert.org/tech-tips/denial-ofser-vice.html)
    • Denial of Service Attacks
  • 4
    • 0027647490 scopus 로고
    • Random early detection gateways for congestion avoidance
    • Aug
    • S. Floyd, and V. Jacobson, "Random early detection gateways for congestion avoidance," IEEE/ACM Transactions on Networking, vol. 1, no. 4, pp. 397-413, Aug. 1993.
    • (1993) IEEE/ACM Transactions on Networking , vol.1 , Issue.4 , pp. 397-413
    • Floyd, S.1    Jacobson, V.2
  • 6
    • 84875352035 scopus 로고    scopus 로고
    • Internet Traffic Archive, BC Traces and LBL-PKT Traces
    • Internet Traffic Archive, BC Traces and LBL-PKT Traces. (http://ita.ee.lbl.gov/html/contrib/BC.html and http://ita.ee.lbl.gov/html/contrib/LBL-PKT.html)
  • 7
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
    • May
    • J. Jung, B. Krishnamoorthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites," Proceedings of 11th World Wide Web Conference, pp. 293-304, May 2002.
    • (2002) Proceedings of 11th World Wide Web Conference , pp. 293-304
    • Jung, J.1    Krishnamoorthy, B.2    Rabinovich, M.3
  • 8
    • 33646878980 scopus 로고    scopus 로고
    • Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics
    • Mar
    • A. Kulkarni and S. Bush, "Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics," Journal of Network and Systems Management, vol. 14, no. 1, Mar. 2006.
    • (2006) Journal of Network and Systems Management , vol.14 , Issue.1
    • Kulkarni, A.1    Bush, S.2
  • 9
    • 71649108583 scopus 로고    scopus 로고
    • Defending network-based services against denial of service attacks
    • J. Kurian and K. Sarac, "Defending network-based services against denial of service attacks," International Journal of Network Security, vol. 9, no. 2, pp. 186-200, 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.2 , pp. 186-200
    • Kurian, J.1    Sarac, K.2
  • 10
    • 71649113001 scopus 로고    scopus 로고
    • Towards improving an algebraic marking scheme for tracing DDoS attacks
    • M. C. Lee, Y. J. He, and Z. Chen, "Towards improving an algebraic marking scheme for tracing DDoS attacks," International Journal of Network Security, vol. 9, no. 3, pp. 204-213, 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.3 , pp. 204-213
    • Lee, M.C.1    He, Y.J.2    Chen, Z.3
  • 13
    • 27644518127 scopus 로고    scopus 로고
    • D-WARD: A source-end defense against flooding denial-of-service attacks
    • July
    • J. Mirkovic, and P. Reiher, "D-WARD: A source-end defense against flooding denial-of-service attacks," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, pp. 216-232, July 2005.
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.3 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.2
  • 14
    • 18144428108 scopus 로고    scopus 로고
    • Ph.D. Dissertation Prospectus, Computer Science Department, University of California, Los Angeles, Jan
    • J. Mirkovic, D-WARD: DDoS Network Attack Recognition and Defense, Ph.D. Dissertation Prospectus, Computer Science Department, University of California, Los Angeles, Jan. 2002.
    • (2002) D-WARD: DDoS Network Attack Recognition and Defense
    • Mirkovic, J.1
  • 16
    • 84875324073 scopus 로고    scopus 로고
    • National Laboratory for Applied Network Research, NLANR Packet Traces
    • National Laboratory for Applied Network Research, NLANR Packet Traces. (http://pma.nlanr.net/Traces/traces/long)
  • 18
    • 2442505788 scopus 로고    scopus 로고
    • Towards multisensor data fusion for DoS detection
    • Nicosia, Cyprus, Mar
    • C. Siaterlis, and B. Maglaris, "Towards multisensor data fusion for DoS detection," Proceedings of SAC' 04, pp. 439-446, Nicosia, Cyprus, Mar. 2004.
    • (2004) Proceedings of SAC' 04 , pp. 439-446
    • Siaterlis, C.1    Maglaris, B.2
  • 21
    • 15944374866 scopus 로고    scopus 로고
    • Pro-tection from distributed denial of service attacks using history-based filtering
    • Anchorage, Alsaka, USA, Aug
    • T. Peng, C. Leckie, and K. Ramamohanarao, "Pro-tection from distributed denial of service attacks using history-based filtering," Proceedings of ICC 2003, pp. 11-15, Anchorage, Alsaka, USA, Aug. 2003.
    • (2003) Proceedings of ICC 2003 , pp. 11-15
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 23
    • 33744910842 scopus 로고    scopus 로고
    • A novel approach for detecting DDoS attacks at an early stage
    • B. Xiao, W. Chen, and Y. He, "A novel approach for detecting DDoS attacks at an early stage," Journal on Supercomputing, vol. 36, pp. 235-248, 2006.
    • (2006) Journal on Supercomputing , vol.36 , pp. 235-248
    • Xiao, B.1    Chen, W.2    He, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.